A quantitative approach to estimate a website security risk using whitelist

Cited 1 time in webofscience Cited 0 time in scopus
  • Hit : 442
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorKim, Young-Gabko
dc.contributor.authorLee, Minsooko
dc.contributor.authorCho, Sanghyunko
dc.contributor.authorCha, Sungdeokko
dc.date.accessioned2013-03-13T02:45:20Z-
dc.date.available2013-03-13T02:45:20Z-
dc.date.created2012-10-29-
dc.date.created2012-10-29-
dc.date.issued2012-10-
dc.identifier.citationSECURITY AND COMMUNICATION NETWORKS, v.5, no.10, pp.1181 - 1192-
dc.identifier.issn1939-0114-
dc.identifier.urihttp://hdl.handle.net/10203/104279-
dc.description.abstractDespite much research on defense against phishing attacks, incidents continue to occur where sensitive (e.g., personal or financial) information is stolen using social engineering and technical spoofing techniques. Most approaches use the notions of blacklists versus whitelists (WWLs), and it is difficult to quantify the degree of a website's vulnerability against phishing attacks. In this paper, we present a quantitative approach for evaluating the phishing possibility of a given website using the refined security risk elements for domain and web page. Design and implementation of the website risk assessment system for antiphishing are also included. It can detect suspicious websites containing phishing attack and abnormal behavior and generates a warning if website is judged untrustworthy. Copyright (c) 2012 John Wiley & Sons, Ltd.-
dc.languageEnglish-
dc.publisherWILEY-BLACKWELL-
dc.subjectVISUAL SIMILARITY ASSESSMENT-
dc.subjectSTATELESS PHISHING FILTER-
dc.subjectDETECTION SYSTEM-
dc.subjectATTACKS-
dc.subjectPHISHWISH-
dc.titleA quantitative approach to estimate a website security risk using whitelist-
dc.typeArticle-
dc.identifier.wosid000309238700012-
dc.identifier.scopusid2-s2.0-84867609101-
dc.type.rimsART-
dc.citation.volume5-
dc.citation.issue10-
dc.citation.beginningpage1181-
dc.citation.endingpage1192-
dc.citation.publicationnameSECURITY AND COMMUNICATION NETWORKS-
dc.identifier.doi10.1002/sec.420-
dc.contributor.localauthorLee, Minsoo-
dc.contributor.nonIdAuthorKim, Young-Gab-
dc.contributor.nonIdAuthorCho, Sanghyun-
dc.contributor.nonIdAuthorCha, Sungdeok-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorphishing-
dc.subject.keywordAuthorpharming-
dc.subject.keywordAuthorwebsite security risk-
dc.subject.keywordAuthorwebsite blacklist-
dc.subject.keywordAuthorwebsite whitelist-
dc.subject.keywordAuthorrisk analysis-
dc.subject.keywordPlusVISUAL SIMILARITY ASSESSMENT-
dc.subject.keywordPlusSTATELESS PHISHING FILTER-
dc.subject.keywordPlusDETECTION SYSTEM-
dc.subject.keywordPlusATTACKS-
dc.subject.keywordPlusPHISHWISH-
Appears in Collection
RIMS Journal Papers
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 1 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0